Thu.Nov 16, 2023

article thumbnail

Ukraine Tracks a Record Number of Cyber Incidents During War

Data Breach Today

Hackers Steal CCTV Footage to Study Efficacy of Missile Strikes and Drone Attacks Ukraine's national computer emergency response team, CERT-UA, says it sees an increase in cyber incidents as Russia's invasion continues. While wiper attacks are ongoing, a rising Russian hacker tactic involves stealing private CCTV footage to study the efficacy of missile strikes and drone attacks.

IT 310
article thumbnail

Alleged Extortioner of Psychotherapy Patients Faces Trial

Krebs on Security

Prosecutors in Finland this week commenced their criminal trial against Julius Kivimäki , a 26-year-old Finnish man charged with extorting a once popular and now-bankrupt online psychotherapy practice and thousands of its patients. In a 2,200-page report, Finnish authorities laid out how they connected the extortion spree to Kivimäki, a notorious hacker who was convicted in 2015 of perpetrating tens of thousands of cybercrimes, including data breaches, payment fraud, operating a botnet and calli

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lawsuit: Health Insurer's AI Tool 'Illegally' Denies Claims

Data Breach Today

Plaintiffs Say UnitedHealthcare Algorithm Rejects Coverage for Elderly Patients The estates of two deceased UnitedHealthcare Medicare Advantage policyholders allege in a proposed federal class action lawsuit filed this week that the insurance giant is using an AI tool to illegally deny necessary coverage for post-acute care, such as skilled nursing, to elderly plan members.

Insurance 278
article thumbnail

Topic Be Damned! AI is the Question

Weissman's World

OK, I give up. It seems that no matter what I get asked to talk about – privacy, information-related risks, the convergence of data and infogov – the first Q&A question I get these days almost always is about AI. What is it? Is it going to take my job? How do I utilize it?… Read More » Topic Be Damned! AI is the Question The post Topic Be Damned!

Privacy 156
article thumbnail

Navigating the Future: Generative AI, Application Analytics, and Data

Generative AI is upending the way product developers & end-users alike are interacting with data. Despite the potential of AI, many are left with questions about the future of product development: How will AI impact my business and contribute to its success? What can product managers and developers expect in the future with the widespread adoption of AI?

article thumbnail

How State Governments Can Regulate AI and Protect Privacy

Data Breach Today

Regulating AI is "like regulating Jell-O," said Massachusetts risk counsel Jenny Hedderman, but states are looking at regulating "areas of harm" rather than AI as a whole. In this episode of "Cybersecurity Insights," Hedderman discusses privacy, third-party vendor risk, and lawyers' use of AI.

Privacy 269

More Trending

article thumbnail

EU AI Act Will Be an 'Enabler for Trust,' Lawmaker Says

Data Breach Today

Trilogue Talks in Final Stages, Says European Parliament Member European lawmakers behind an artificial intelligence regulation that's close to finalization predicted Thursday the law will set global standards. "We want AI to develop in Europe, and this is why we want to build a trustworthy ecosystem," said Brando Benifei.

article thumbnail

Zimbra zero-day exploited to steal government emails by four groups

Security Affairs

Google TAG revealed that threat actors exploited a Zimbra Collaboration Suite zero-day ( CVE-2023-37580 ) to steal emails from governments. Google Threat Analysis Group (TAG) researchers revealed that a zero-day vulnerability, tracked as CVE-2023-37580 (CVSS score: 6.1), in the Zimbra Collaboration email software was exploited by four different threat actors to steal email data, user credentials, and authentication tokens from government organizations.

article thumbnail

Google Says 4 Attack Campaigns Exploited Zimbra Zero-Day

Data Breach Today

Zimbra Patched the Cross-Site Scripting Vulnerability on July 25 A zero-day flaw in the Zimbra Collaboration email server proved to be a bonanza for hackers as four distinct threat actors exploited the bug to steal email data and user credentials, says Google. Most of the exploit activity occurred after Zimbra had posted a hotfix on July 5.

268
268
article thumbnail

Running Signal Will Soon Cost $50 Million a Year

WIRED Threat Level

Signal’s president reveals the cost of running the privacy-preserving platform—not just to drum up donations, but to call out the for-profit surveillance business models it competes against.

Privacy 113
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

SonicWall Buys Solutions Granted to Offer MSPs More Services

Data Breach Today

Buying Master MSSP Will Bring MDR, SOC and Vulnerability Management to MSPs, MSSPs SonicWall acquired a longtime master MSSP partner to bring MDR, SOC and vulnerability management capabilities to its managed service providers. Buying Solutions Granted will help SonicWall detect and respond to endpoint or cloud-based threat activity on behalf of its MSP and MSSP partners.

Cloud 268
article thumbnail

Despite Hype, the Password-Free Workplace Is Still a Long Way Off

Dark Reading

More than half of organizations are nowhere near ditching passwords, even as cyberattackers continue to have a field day with workers' poor credential choices.

Passwords 119
article thumbnail

CISA, FBI Issue New Warning Following Las Vegas Cyberattack

Data Breach Today

Agencies Release Joint Advisory Urging Organizations to Implement New Mitigations CISA and the FBI released an advisory recommending that critical infrastructure organizations implement a series of recommendations to thwart a unique hacking group known for targeting commercial facilities, as seen in the recent cyberattack targeting MGM Resorts International.

267
267
article thumbnail

Dangerous Apache ActiveMQ Exploit Allows Stealthy EDR Bypass

Dark Reading

There's no time to waste: For organizations on the fence about patching the critical bug in ActiveMQ, the new proof-of-concept exploit should push them towards action.

114
114
article thumbnail

How Embedded Analytics Gets You to Market Faster with a SAAS Offering

Start-ups & SMBs launching products quickly must bundle dashboards, reports, & self-service analytics into apps. Customers expect rapid value from your product (time-to-value), data security, and access to advanced capabilities. Traditional Business Intelligence (BI) tools can provide valuable data analysis capabilities, but they have a barrier to entry that can stop small and midsize businesses from capitalizing on them.

article thumbnail

BlackCat Gang Tattles to SEC About Victim Not Disclosing Breach

Data Breach Today

Ransomware Group Says MeridianLink Didn't Tell SEC About Cyberattack Within 4 Days The BlackCat ransomware group tattled to U.S. federal regulators about an alleged victim not disclosing a material cyberattack within four business days. The group, also known as Alphv, listed MeridianLink on its data leak site and threatened to leak stolen data.

article thumbnail

3 Ways Behavioral Economics Obstructs Cybersecurity

Dark Reading

People are not robots; their decisions are based on emotion as much as data. Often, this can lead them to make mistakes with serious security implications for the business.

article thumbnail

SEC Aims to Avoid Cyber Disclosure Rule 'Compliance Burdens'

Data Breach Today

Official Says Disclosure Rule Includes Exceptions, Extensions for Smaller Companies The U.S. Securities and Exchange Commission's requirement for publicly traded companies to report cyber incidents that have a material impact within four days is "not about playing gotcha with public companies," said the commission’s director of the corporation finance division.

article thumbnail

A Spy Agency Leaked People's Data Online—Then the Data Was Stolen

WIRED Threat Level

The National Telecommunication Monitoring Center in Bangladesh exposed a database to the open web. The types of data leaked online are extensive.

Privacy 121
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

Hanzo Wins “Best Use of AI for eDiscovery” In 2023 LegalTech Breakthrough Awards Program

Hanzo Learning Center

Hanzo wins 'Best Use of AI for eDiscovery' at 2023 LegalTech Breakthrough Awards, for its innovative AI-driven tool, Hanzo Illuminate with Spotlight AI.

IT 117
article thumbnail

BlackCat Ransomware's New SEC Reporting Tactic: Turn Regulations Against Victims

KnowBe4

Man Bites Dog: In an unusual twist in cybercrime, the ransomware group BlackCat/ALPHV is manipulating the SEC's new 4-day rule on cyber incident reporting to increase pressure on their victims. This latest maneuver highlights a sophisticated understanding of regulatory impacts in ransomware strategies.

article thumbnail

FTC’s Voice Cloning Challenge

Schneier on Security

The Federal Trade Commission is running a competition “to foster breakthrough ideas on preventing, monitoring, and evaluating malicious voice cloning.

article thumbnail

APTs Swarm Zimbra Zero-Day to Steal Government Info Worldwide

Dark Reading

At least four separate campaigns against CVE-2023-37580 in the popular Zimbra Collaboration Suite aimed to siphon up reams of sensitive mail data.

article thumbnail

Embedding BI: Architectural Considerations and Technical Requirements

While data platforms, artificial intelligence (AI), machine learning (ML), and programming platforms have evolved to leverage big data and streaming data, the front-end user experience has not kept up. Holding onto old BI technology while everything else moves forward is holding back organizations. Traditional Business Intelligence (BI) aren’t built for modern data platforms and don’t work on modern architectures.

article thumbnail

How to Help "Frequent Clickers" Become More Mindful

KnowBe4

Within our organizations, there are those employees who consistently exhibit mindfulness, avoiding every phishing attempt. Yet, there are also those users who, despite repeated education efforts, habitually fall prey to phishing emails and simulations, neglecting the tell-tale signs of social engineering. These individuals are known as "frequent clickers.

article thumbnail

'Randstorm' Bug: Millions of Crypto Wallets Open to Theft

Dark Reading

The security vulnerability in a component of a widely used JavaScript implementation of Bitcoin makes passwords guessable via brute-force attacks.

Passwords 102
article thumbnail

US Congress Report Calls for Privacy Reforms After FBI Surveillance 'Abuses'

WIRED Threat Level

A new report by an oversight committee in the US House of Representatives says the FBI has routinely violated rules governing FISA's Section 702 surveillance program and must be reined in.

Privacy 80
article thumbnail

IT Pros Worry Generative AI Will Be a Major Driver of Cybersecurity Threats

Dark Reading

Organizations are concerned about generative AI technologies as being a major driver of cybersecurity threats in 2024.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

The data quality rule of 1%: how to size for success

Collibra

In this post, we will be providing a practical walkthrough for ROI in your data quality program. When kickstarting data quality with different organizations we’ve discovered this is a common need. Questions include, ‘how many columns or assets should I govern’ and ‘how many require data quality checks’? As a governance team, we are often sizing up the landscape of large enterprises to answer these questions.

article thumbnail

Consumer Software Security Assessment: Should We Follow NHTSA's Lead?

Dark Reading

Vehicles are required to meet basic safety standards. Having similar requirements for software would give consumers greater control over their privacy and security.

article thumbnail

Maine government says data breach affects 1.3 million residents via TechCrunch

IG Guru

Check out the article here. The post Maine government says data breach affects 1.3 million residents via TechCrunch first appeared on IG GURU.